Lines Matching +full:no +full:- +full:dump +full:- +full:oops
1 // SPDX-License-Identifier: GPL-2.0-only
9 * This function is used through-out the kernel (including mm and fs)
46 * Should we dump all CPUs backtraces in an oops event?
142 * Stop ourself in panic -- architecture code may override this
162 * crash dump, it should save registers of each stopped CPU and disable
163 * per-CPU features such as virtualization extensions.
191 * as saving register state for crash dump.
247 * and then performs the secondary CPUs shutdown - we cannot have
258 * situation. If we want to do crash dump after notifier calls in panic_other_cpus_shutdown()
270 * panic - halt the system
306 * It's possible to come here directly from a panic-assertion and in panic()
308 * preempt to be disabled. No point enabling it later though... in panic()
335 if (len && buf[len - 1] == '\n') in panic()
336 buf[len - 1] = '\0'; in panic()
338 pr_emerg("Kernel panic - not syncing: %s\n", buf); in panic()
341 * Avoid nested stack-dumping if a panic occurs during oops processing in panic()
369 * add information to the kmsg dump output. in panic()
397 * panic() is not being callled from OOPS. in panic()
436 /* Make sure the user can actually press Stop-A (L1-A) */ in panic()
438 pr_emerg("Press Stop-A (L1-A) from sun keyboard or send break\n" in panic()
445 pr_emerg("---[ end Kernel panic - not syncing: %s ]---\n", buf); in panic()
463 * TAINT_FORCED_RMMOD could be a per-module flag but the module
489 * print_tainted - return a string to represent the kernel taint state.
491 * For individual taint flag meanings, see Documentation/admin-guide/sysctl/kernel.rst
510 t->c_true : t->c_false; in print_tainted()
536 * some notewortht-but-not-corrupting cases, it can be set to true.
576 /* This CPU may now print the oops message */ in do_oops_enter_exit()
587 } while (--spin_counter); in do_oops_enter_exit()
602 * Return true if the calling CPU is allowed to print oops-related info.
611 * Called when the architecture enters its oops handler, before it prints
612 * anything. If this is the first CPU to oops, and it's oopsing the first
617 * side-effect of preventing later-oopsing CPUs from mucking up the display,
637 pr_warn("---[ end trace %016llx ]---\n", 0ULL); in print_oops_end_marker()
641 * Called when the architecture exits its oops handler, after printing
663 raw_smp_processor_id(), current->pid, file, line, in __warn()
667 raw_smp_processor_id(), current->pid, caller); in __warn()
670 vprintk(args->fmt, args->args); in __warn()
736 memset(__start_once, 0, __end_once - __start_once); in clear_warn_once_set()
757 * Called when gcc's -fstack-protector feature is used, and
758 * gcc detects corruption of the on-stack canary value
763 panic("stack-protector: Kernel stack is corrupted in: %pB", in __stack_chk_fail()
780 return -EINVAL; in oops_setup()
785 early_param("oops", oops_setup);
792 return -EINVAL; in panic_on_taint_setup()
796 return -EINVAL; in panic_on_taint_setup()
798 /* make sure panic_on_taint doesn't hold out-of-range TAINT flags */ in panic_on_taint_setup()
802 return -EINVAL; in panic_on_taint_setup()